Hands-On Reinforcement Learning with Python
Sudharsan Ravichandiran
Hands-On Transfer Learning with Python
Dipanjan Sarkar
Machine Learning for Mobile
Revathi Gopalakrishnan
Mastering Machine Learning Algorithms
Giuseppe Bonaccorso
Natural Language Processing with TensorFlow
Thushan Ganegedara
Python Deep Learning
Ivan Vasilev
Python Deep Learning Projects
Matthew Lamons
Python Machine Learning By Example
Yuxi (Hayden) Liu
Python Machine Learning Cookbook, Second Edition
Giuseppe Ciaburro
Unity Artificial Intelligence Programming , Fourth Edition
Davide Aversa
Advanced Deep Learning with Keras
Rowel Atienza
Eloquent Javascript [3rd edition]
Marijn Haverbeke
Attacking Network Protocols
James Forshaw
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Gray Hat C#
Brandon Perry
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
iOS Application Security
David Thiel
Metasploit
Mati Aharoni & David Kennedy & Jim O'Gorman & Devon Kearns
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman
Pentesting Azure Applications: The Definitive Guide to Testing ...
Matt Burrough
Practical Forensic Imaging
Bruce Nikkel
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
Serious Cryptography
Jean-Philippe Aumasson
Silence on the Wire
Michal Zalewski
The Car Hacker’s Handbook
Craig Smith
The Tangled Web
Android Security Internals: An In-Depth Guide to Android’s Security ...
Nikolay Elenkov
Hands-on Cybersecurity for Architects
Neil Rerup
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Hands-On Penetration Testing on Windows
Phil Bramwell
Industrial Cybersecurity
Pascal Ackerman
Learning Malware Analysis
MONNAPPA K A
Mastering pfSense, Second Edition
David Zientara
Mastering Kali Linux for Advanced Penetration Testing, Second ...
Vijay Kumar Velu
Network Analysis Using Wireshark 2 Cookbook Second Edition
Nagendra Kumar Nainar
Metasploit for Beginners
Sagar Rahalkar
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Practical Cyber Intelligence
Wilson Bautista Jr.
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Digital Forensics and Incident Response
Gerard Johansen
Practical Mobile Forensics - Third Edition
Rohit Tamma
Cybersecurity: Attack and Defense Strategies
Yuri Diogenes
Web Penetration Testing with Kali Linux - Third Edition
Gilberto Nájera-Gutiérrez
CompTIA Security+ Certification Guide
Ian Neil
Learn You Some Erlang for Great Good!: A Beginner's Guide
Fred Hebert
Database Systems: The Complete Book (2nd Edition)
Hector Garcia-Molina & Jeffrey D. Ullman & Jennifer Widom
Mastering Perl
Brian D Foy
Operating System Concepts
Abraham Silberschatz & Peter B. Galvin & Greg Gagne
Python Playground: Geeky Projects for the Curious Programmer
Manesh Vekitachalam
Principles of Network and System Administration 2nd Edition
Mark Burgess
UNIX and Linux System Administration Handbook
Evi Nemeth & Garth Snyder & Trent R. Hein & Ben Whaley
C++ Primer
Stanley B. Lippman & Josée Lajoie & Barbara E. Moo
C Programming Language
Brian W. Kernighan & Dennis Ritchie
Write Great Code: Understanding the Machine (Volume 1)
Randall Hyde
Write Great Code: Understanding the Machine (Volume 2)
Database Systems: A Practical Approach to Design, Implementation, ...
Thomas Connolly & Carolyn Begg
An Introduction to the C Programming Language and Software Design
Tim Bailey
Computer Organization and Design: The Hardware/Software Interface
David A. Patterson & John L. Hennessy
Computer Networking: A Top-Down Approach (6th edition)
James F. Kurose & Keith Ross